Download Now Free registration required
In Mobile Sensor Network, attacker can easily capture a node and compromise that sensor node and extract keying materials from that compromised node and make replicas of them. These replica node attacks are dangerous because they allow the attacker to leverage the compromise of a few nodes to exert control over much of the network .Then attacker use the replica node to inject fake data and disrupt the entire operations in the network. These replica nodes are detected using system configure speed and neighbor identity method.
- Format: PDF
- Size: 223.21 KB